This is the public portal for all IBM Z Hardware and Operating System related offerings. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
Thanks very much for the additional info - very helpful. One more question - did you open a case for the situation that caused NCA to generate a policy file that pagent rejected? If so, please pass it along. If not, we would be interested in the X500 name you used that led to the error..
I am looking for a test ability to confirm that a updated pagent config will be successfully parsed without error prior to the pagent file being used. For example is a FQDN is coded with a X.500 name, z/OS configuration assistant allows that kind of setup and generates a file that is coded as such, however if such a file is loaded into pagent ( it generates a error) NOW if such a file was installed while a LPAR is down (via a filesystem update) then on system IPL PAGENT totally ignores said file and then depending on the level of inter system encryption setup it becomes much more difficult to correct that mistake
Thus a function to test if the file will be loaded successfully by pagent as if you were doing so for real would be a great way to give confidence a pagent update can be done during a ipl of system
Thanks for submitting this requirement. Can you expand a bit on what you mean by "logic errors?" Are you just looking for a pagent function to prove that the policy file can be successfully parsed and installed into the TCP/IP stack, or are you also looking for something to test the behavior of the policy rules themselves? Also, which policy types are most important to you regarding this capability?